CVE-2025-41742

Sprecher · Sprecher Automations SPRECON-E-C, SPRECON-E-P, SPRECON-E-T3

A critical vulnerability exists in multiple Sprecher Automations products due to the use of default cryptographic keys.

Executive summary

A critical vulnerability exists in multiple Sprecher Automations products due to the use of default cryptographic keys. An unauthorized remote attacker can exploit this weakness to gain complete control over affected industrial control systems, allowing them to read, modify, or delete sensitive project data and access devices for remote maintenance, potentially causing significant operational disruption.

Vulnerability

The affected products utilize hard-coded, default cryptographic keys for securing communications and access. An attacker with knowledge of these static keys, which are common across all vulnerable installations, can bypass authentication mechanisms. By presenting these keys, an attacker can establish a trusted remote session to read, modify, and write project files and data, or gain full access to the device through its remote maintenance interface, effectively achieving administrative-level control.

Business impact

This vulnerability is rated as critical severity with a CVSS score of 9.8, posing a severe risk to the organization. Successful exploitation could lead to a complete compromise of the affected industrial control systems. Potential consequences include manipulation of critical infrastructure processes, operational shutdowns, theft or corruption of sensitive operational data, and unauthorized configuration changes that could impact safety and reliability. The ability to access remote maintenance functions grants the attacker a persistent foothold, enabling further lateral movement within the operational technology (OT) network.

Remediation

Immediate Action: Organizations must prioritize the deployment of vendor-supplied updates. Update all affected Sprecher Automations products to the latest patched version immediately to replace the default cryptographic keys. Following the update, review access logs for any signs of unauthorized connections or modifications that may have occurred prior to patching.

Proactive Monitoring: Implement enhanced monitoring of network traffic to and from the affected devices. Look for unusual or unauthorized remote access attempts, particularly from untrusted IP ranges. Monitor system logs for unexpected configuration changes, project file modifications, or logins occurring outside of scheduled maintenance windows.

Compensating Controls: If immediate patching is not feasible, implement the following controls to reduce the risk of exploitation:

  • Use network segmentation to isolate affected devices from the internet and corporate IT networks.
  • Implement strict firewall rules to restrict remote access exclusively to trusted IP addresses and authorized management stations.
  • Employ an Intrusion Detection System (IDS) or Intrusion Prevention System (IPS) to detect and block malicious connection attempts targeting the affected systems.

Exploitation status

Public Exploit Available: False

Analyst recommendation

Given the critical CVSS score of 9.8 and the potential for complete system compromise, this vulnerability requires immediate attention. We strongly recommend that organizations apply the vendor-provided patches to all affected Sprecher Automations devices as the primary remediation action. Where patching must be delayed, the compensating controls outlined above, especially network segmentation and access control, should be implemented without delay to mitigate the significant risk of operational disruption and unauthorized access.